General
-
Target
d53ffd1fce97043454f3926eb7fa0618_JaffaCakes118
-
Size
4.7MB
-
Sample
241208-e5yzcasqcw
-
MD5
d53ffd1fce97043454f3926eb7fa0618
-
SHA1
5bdd5ff0071b867d26bb314e565cb6d4e5468a7e
-
SHA256
a587faa9be47724317847e4404a21a1af65fdb9c4c8de216ed7c33fc1aea4dff
-
SHA512
04e9ec5a6ef3314146297e51a3b93a3775fe875e3abc7a61f1b00359c613bb2c7a431fc410e5532583006a929d43c4a9a71ffe9b911f81f5c1321f486d33dac4
-
SSDEEP
98304:49YceCRZRcjVmkTt/P5JlBvZiH6aNei2WNB4ELoXY7y/C8q/b7nmEgHJXp:4aceOchvT9flBvZiH6aNHRuYoXY7Y1q2
Behavioral task
behavioral1
Sample
d53ffd1fce97043454f3926eb7fa0618_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Targets
-
-
Target
d53ffd1fce97043454f3926eb7fa0618_JaffaCakes118
-
Size
4.7MB
-
MD5
d53ffd1fce97043454f3926eb7fa0618
-
SHA1
5bdd5ff0071b867d26bb314e565cb6d4e5468a7e
-
SHA256
a587faa9be47724317847e4404a21a1af65fdb9c4c8de216ed7c33fc1aea4dff
-
SHA512
04e9ec5a6ef3314146297e51a3b93a3775fe875e3abc7a61f1b00359c613bb2c7a431fc410e5532583006a929d43c4a9a71ffe9b911f81f5c1321f486d33dac4
-
SSDEEP
98304:49YceCRZRcjVmkTt/P5JlBvZiH6aNei2WNB4ELoXY7y/C8q/b7nmEgHJXp:4aceOchvT9flBvZiH6aNHRuYoXY7Y1q2
-
SectopRAT payload
-
Sectoprat family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM)
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-